WO2008104039A2 - Method of transferring data being stored in a database - Google Patents

Method of transferring data being stored in a database Download PDF

Info

Publication number
WO2008104039A2
WO2008104039A2 PCT/BE2008/000015 BE2008000015W WO2008104039A2 WO 2008104039 A2 WO2008104039 A2 WO 2008104039A2 BE 2008000015 W BE2008000015 W BE 2008000015W WO 2008104039 A2 WO2008104039 A2 WO 2008104039A2
Authority
WO
WIPO (PCT)
Prior art keywords
code
subscriber
content provider
identifier
manager
Prior art date
Application number
PCT/BE2008/000015
Other languages
French (fr)
Other versions
WO2008104039A8 (en
WO2008104039A3 (en
Inventor
Michel Degraeve
Nathanaël ACKERMAN
Olivier Markowitch
Original Assignee
Nolink
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nolink filed Critical Nolink
Priority to EP08714495A priority Critical patent/EP2137945A2/en
Publication of WO2008104039A2 publication Critical patent/WO2008104039A2/en
Publication of WO2008104039A3 publication Critical patent/WO2008104039A3/en
Publication of WO2008104039A8 publication Critical patent/WO2008104039A8/en
Priority to US12/549,257 priority patent/US20100088401A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Definitions

  • the new invention is related to a method for transferring data being stored in a database by using a mobile phone, preferably said database being accessible via Internet and allows activating access to Internet resources .
  • MSISDN mobile phone number
  • the common purpose of these processes is to create a unique relationship between each subscriber and the delivery process, either by linking directly the MSISDN to the delivery address, or indirectly using an alias which stands for MSISDN.
  • Some mobile service suppliers i.e. the French suppliers, cannot directly collect the subscriber's mobile phone number, which is replaced by a unique valid alias which is periodically renewed. It is obvious that the alias is a substitute for the MSISDN to the extent that it identifies each subscriber individually for a determined period of time.
  • the aim of the present invention is to allow any subscriber to use his/her mobile phone in order to transfer data on Internet which do not have the drawbacks of the State of the Art.
  • the aim of the present invention is to allow any subscriber to use his/her mobile phone in order to transfer anonymously data on Internet.
  • the present invention allows any subscriber to anonymously use his/her mobile phone in order to transfer data on the Internet, using either the moment when the request was performed or the place where the request was performed or either a combination of the said time and the said place.
  • the present invention discloses a method of transferring a selection of data stored in a database, managed by a content provider, by at least one mobile phone user, called subscriber wherein said database is connected to a management platform, called manager, said manager being connected to one or more application servers and to one or more telecommunication suppliers and wherein said transfer process comprises the following steps:
  • Said subscriber enters into connection with one of said telecommunication suppliers by sending an identifier of said content provider, the sending action is named the request;
  • Said supplier transmits at least said identifier, together with at least a reception time stamp and/or a space stamp of said request to said manager;
  • Said manager associates said identifier with an Internet delivery address of said content provider and associates said time stamp and/or space stamp with a code;
  • Said manager transmits to said telecommunication supplier delivery information comprising either said Internet delivery address directly or indirectly linked to said code, or said Internet delivery address together with said code, or any relevant information directly or indirectly linked to said code to access Internet resources, said supplier being in charge to transmit said delivery information to said subscriber;
  • said subscriber goes to said address either by clicking on said delivery address directly or indirectly linked to said code, or by going to said delivery address with any Internet terminal and encoding said code preferably in an access form;
  • the content provider associates said code with a data selection and makes it available for said subscriber;
  • the time stamp is the instant where the request was performed characterized by at least the date, the hour, the minute and the second of the request .
  • the space stamp is the location where the request was performed characterized by for example the GPS coordinates of the subscriber.
  • At least two subscribers are transferring a selection of data stored in a data base managed by a content provider .
  • At least two subscribers having sent said identifier of said Content provider, receive an identical code .
  • a counter is assigned to every said code.
  • said counter is incremented by the manager each time it receives a time stamp and/or space stamp reception from the telecommunication supplier corresponding to the said code .
  • an adjustement parameter assigned to each counter is used to define a probability density function, the said density function being used to fix when the counter will be incremented.
  • said identifier of said content provider is sent by said subscriber to said telecommunication supplier, either by sending an SMS message, or by calling, or by clicking on a link during an Internet session, or by sending an E-mail to the content provider's mailbox or by any other telecommunication means .
  • said subscriber directly sends a data selection identifier to a destination dedicated to said Content provider, in this case either said code is sufficient to identify said selection, or said manager transmits said code and said data selection identifier to said content provider in order to allow to transfer said selection of data.
  • said delivery address and said code are sent by said supplier, either by sending an SMS message, or by calling, or by sending information, or by redirecting to another application during an Internet session or by any other communication and/or telecommunication means .
  • said selection can correspond to a given amount of codes .
  • said telecommunication supplier transmits the subscriber's identifier, on top of said identifier and said time stamp and/or the space stamp, subscriber's identifier being preferably stored in a temporary database in order to be able to send said Internet delivery address and said code to said subscriber, said subscriber's identifier being preferably deleted immediately after sending this information.
  • said manager associates with said code an encrypted or alias code.
  • said encrypted or alias code is received by said content provider, said content provider receives or collects the key needed to decrypted said encrypted or alias code, before associating said code to said data selection.
  • the encryption steps are performed by the manager that uses at least two keys.
  • the present invention allows any subscriber to preferably anonymously use his/her mobile phone in order to transfer data on the Internet, using either the moment when the request was performed or the place where the request was performed or a combination of the said time and the said place or any combination of any physical data that can be acquired by his/her mobile phone.
  • the present invention discloses a method of collecting a selection of data stored in a database, managed by a content provider, by mobile phone user, called subscriber wherein said database is connected to a management platform, called manager, said manager being connected to one or more application servers and to one or more telecommunication suppliers and wherein said collect process includes the following steps:
  • Said subscriber enters into connection with one of said telecommunication suppliers by sending an identifier of said content provider, the sending action is named the request;
  • Said supplier transmits at least said identifier, together with reception time stamp (date, hour, minute, second) of said request to said manager;
  • Said manager associates said identifier with the Internet delivery address of said content provider and associates said time stamp with a code corresponding to the moment when the request was performed;
  • Said manager transmits to said telecommunication supplier said Internet delivery address, either directly parameterised with said code, or together with said code, or according to any other method meant to access Internet resources, said supplier being in charge to retransmit this to said subscriber;
  • the content provider associates said code with a data selection and makes it available for said subscriber;
  • the said identifier of said content provider is sent by said subscriber to said telecommunication supplier, either by sending an SMS message, or by calling, or by clicking on a link during an Internet session, or by sending an E-mail to the content provider's mailbox or by any other telecommunication means .
  • the said subscriber directly sends a data selection identifier to a destination dedicated to said Content provider, in this case either said code is sufficient to identify said selection, or said manager transmits said code and said data selection identifier to said content provider in order to allow to collect said selection anonymously.
  • the said delivery address and said code are sent by said supplier, either by sending an SMS message, or by calling, or by sending information, or by redirecting to another application during an Internet session or by any other communication and/or telecommunication means.
  • the said delivery address and said code are sent by said supplier, either by sending an SMS message, or by calling, or by sending information, or by redirecting to another application during an Internet session or by any other communication and/or telecommunication means.
  • several subscribers, having sent said identifier of said Content provider receive an identical code.
  • the said selection can correspond to a given amount of codes .
  • said telecommunication supplier transmits the subscriber's identifier, on top of said identifier and said time stamp.
  • the subscriber's identifier will be stored in a temporary database in order to be able to send said Internet delivery address and said code to said subscriber. Immediately after sending this information, said subscriber' s identifier will be deleted.
  • said manager associates with said code an encrypted or alias code.
  • said content provider receives or collects the key needed to decrypted said encrypted or alias code, before associating said code to said data- selection.
  • the present invention preferably exists in the form of a method, which is available on the Internet.
  • the service is managed by a management platform (hardware/software, named hereinafter manager) that puts in contact content owners or their distributors and all the mobiles subscribers.
  • a management platform hardware/software, named hereinafter manager
  • the content owner owns a database that he can market directly or through a distribution network.
  • the distributor's role consists in distributing contents and getting supplied by one or more content owners (both are referred to as so-called content provider (s) ).
  • Content or data have to be intended as any digital file type: program, text, tone, fix or animated picture ...
  • the invention is noticeable from other distribution systems using data collection as it allows advantageously the subscriber to protect his/her anonymity when delivering the requested content.
  • Only the content provider supplies a method for providing at least two related elements: one identifier, i.e. his name, a word, a phone number (long number, short number,...), a URL... and an Internet delivery address from which data can be retrieved (URL) .
  • one identifier i.e. his name, a word, a phone number (long number, short number,...), a URL... and an Internet delivery address from which data can be retrieved (URL) .
  • the subscriber can use all the mobile communication means (call, SMS message, Internet session%) in order to identify the content provider: sending a key word in an SMS message, calling to a specific number, clicking on a link or a button...
  • the request of the subscriber activates the identification process of a data selection and an Internet delivery address
  • the subscriber can connect to the Web and, depending on the Internet method used to access the data, (i.e. GET or POST methods, or any other Internet access method) , either he clicks on the URL parameterised with the data identifier, or he goes to the supplied Internet address and fills in said identifier in the access form in order to consult and/or download the requested data.
  • the Internet method used to access the data i.e. GET or POST methods, or any other Internet access method
  • Internet terminal shall be understood as any device that enables to establish and to maintain an Internet session.
  • the main characteristic of the invention consists in separating the request management (telecommunications aspects) and the data delivery process, using an identifier that has no unique or direct link with the subscriber (MSISDN, IP-address, E-mail, ...) .
  • MSISDN identifier that has no unique or direct link with the subscriber
  • the moment when the request was performed is used as unique subscriber' s identifier; or the place where the request was performed is used as unique subscriber' s identifier;
  • the request time and the request place - is used as unique subscriber's identifier .
  • the identifier corresponding to the request time and/or to the request place and/or to the request physical data can also be associated to the selection of data.
  • the different steps in the isolated delivery process management are the following:
  • the manager needs at least two information from the telecommunication supplier (mobile operator and/or wireless access service provider) in order to operate the delivery process: the content provider's identifier and the time stamp (date, hour, minute and second%) corresponding to the request reception time and/or the space stamp corresponding to the request place and/or any combination of any stamps corresponding to any physical data that can be acquired by subscriber's mobile phone.
  • the content provider's identifier and the time stamp (date, hour, minute and second7) corresponding to the request reception time and/or the space stamp corresponding to the request place and/or any combination of any stamps corresponding to any physical data that can be acquired by subscriber's mobile phone.
  • the manager associates the content provider's identifier with the delivery URL and associates the time stamp and/or the space stamp and/or any combination of any physical data that can be acquired by subscriber's mobile phone with a code corresponding respectively to the moment when the request is performed and/or to the place where the request is performed and/or to any combination of any physical data that can be acquired by subscriber's mobile phone;
  • the manager transmits to the telecommunication service supplier either the URL, directly or indirectly linked to said code, or the Internet delivery address and said code or any relevant information directly or indirectly linked to said code to access Internet resources. Subsequently said supplier has to transmit both to the subscriber.
  • the subscriber consult and/or downloads data either by clicking directly on the URL, or by going to the delivery site and encoding said code into the access form.
  • the content provider links or associates said code to a selection of data and makes this available for the subscriber.
  • the subscriber's anonymity remains effectively protected, as when he/she is consulting and/or downloading data from the content provider's side, he is identified only through a code corresponding to request time and/or to the request place and/or to any physical data acquired when the request was performed.
  • This code is not unique, to the extent that several, in particular all, the subscribers who request the data selection at the same time and/or at the same place can receive the same code.
  • the identifier which is originating the request either MSISND, or IP address, or E-mail... is totally ignored when data are delivered. It means by totally ignored that no unambiguous or univalent link can be establish between a subscriber and its request, without using illegal practises such as coalition between the telecommunication supplier and the manager.
  • the code comprises characters that can be either uppercase or lowercase alphabetic characters (A-Z, a-z), numbers (0-9) or special characters. A little more than 6 bits are needed to encode each character.
  • a code of n characters of the above- mentioned 83 possible symbols corresponds to a binary value composed by n*log 2 (83) bits.
  • the radio presenter of a program invites his audience to download for free some tracks from the playlist, offered by an advertiser. One just needs to send the name of the radio
  • SMS message (content provider's identifier) by SMS message.
  • the telecommunication supplier collects the subscriber's MSISDN, the name of the radio and the SMS time stamp (i.e. December 10, 14 hour 21 minutes and 43 seconds) . He only transmits the name of the radio and the time stamp to the Manager .
  • the manager associates the content provider' s identifier with the Internet delivery address (www.nameoftheradio.com) and determines the code corresponding to the moment when the request was performed, i.e. 12.10.14.21.43
  • Code and URL are transmitted to the telecommunication supplier, who sends them back to the subscriber, referring to the MSISDN number, i.e. in an SMS message.
  • the application server of the radio website associates the code corresponding to the moment when the request was performed to the music that was played on the radio at the same time, or to the playlist of the programme broadcast when the SMS message was sent, or to the daily playlist...
  • the subscriber consults the playlist and downloads the selected track; meanwhile he is displaying the commercial from the advertiser.
  • the subscriber calls to the Interactive Voice Response (IVR) of the radio station and receives a standard SMS message mentioning the Internet delivery address in the selected implementation format;
  • IVR Interactive Voice Response
  • the subscriber calls to the radio station' s IVR or sends an SMS message with the name of the radio and receives a WAP push SMS comprising the URL parameterised with the code corresponding to request time and from which he will be able to consult the playlist and/or download the selected track;
  • the subscriber listens to the radio on line via his mobile phone, clicks on the browser download .button that is especially developed, a window opens and the window URL parameters are based on the code corresponding to the clicking time stamp.
  • the subscriber can either consult all the playlist or part of it and downloads the selected track, or a commercial is displayed meanwhile the musical track is downloaded on his terminal.
  • the click on the button stands for identifying the content provider and the temporary IP address is used only to send the URL parameterised with the code corresponding to request time.
  • the subscriber remains anonymous for the content provider.
  • all the subscribers who are sending or selecting data at the same time receive the same code and all of them access the same URL associated with the same code.
  • the radio station can count the amount of sent URL associated with the same code and can decide to limit the download amount to this threshold in order to avoid misuse.
  • the code can be produced from the time stamp and/or the space stamp by means of cryptographic methods such as pseudo-random bit generator (PRBG) , hash functions or security key encryption algorithms.
  • PRBG pseudo-random bit generator
  • a secret key encryption algorithm can be used to produce the codes.
  • code E ( k, time stamp and/or space stamp) where E() is the encryption function (AES for example) and k is the secret encryption key.
  • PRGB can be used to generate binary sequences of arbitrary length.
  • the content provider receives a time stamp and/or a space stamp, it generates a random binary value.
  • the content provider has to store the correspondence between the time stamp and/or the space stamp and the produced random binary value.
  • a cryptographic hash function based on a secret key also known as "message authentication code” or MAC
  • MAC message authentication code
  • the secret key used to compute the function has to be transmitted to the content provider .
  • the same key can be used to encrypt all the code produced for the same content provider during a certain period of time.
  • the key is initially shared between the manager and the content provider.
  • the only required communication between the manager and the content provider is sending the encryption key.
  • the service provider has to receive from the manager the encryption key and the time stamps and/or the space stamps of the received request, in order for the service provider to be able to compare the code provided by the subscriber with hashes of the received time stamps and/or space stamp.
  • the code sent to the subscriber can be encrypted or linked or associated to an alias code in such a way that the time stamp and/or the space stamp and/or any acquired physical data cannot be deduced from the code. Afterwards the decrypted code can be associated with a selection of the database.
  • the subscriber sends a request for data transfer.
  • the telecommunication supplier sends the content identifier and a time stamp and/or a space stamp to the manager.
  • the manager associates a code to this time stamp and/or this space stamp received from the telecommunication supplier.
  • the manager If it is the first time that the manager uses this code, the manager set the counter to 1. If the code was already used, the manager increments by 1 the counter associated to this code. If the counter reaches its maximum value, no new code is produced anymore.
  • the manager sends the encrypted code (codel), the corresponding time stamp and/or space stamp, and the Internet delivery address to the telecommunication supplier.
  • the telecommunication supplier selects one MSISDN from the set of MSISDN that are associated with the corresponding time stamp and/or space stamp.
  • the telecommunication supplier tags the selected MSISDN as already used and send a message comprising the codel and the Internet delivery address to the subscriber to which the chosen MSISDN corresponds .
  • the subscriber goes to the Internet delivery address and enters the codel.
  • the content provider decrypts the codel thanks to the secret key kl shared with the manager and retrieves the time stamp and the counter.
  • the here above described implementation allows to control easily the amount of connections to the selectable data. Moreover, this implementation prevents illicit connections to the service with stolen codes.
  • the increment of the counter can be tuned using an adjustment parameter.
  • Each counter can have its own adjustment parameter.
  • the said parameter defines a probability density function that is used to fix when the counter will be incremented.
  • MSISDN mobile phone numbers
  • the subscriber sends a request for data transfer; the telecommunication supplier sends the content identifier and a time stamp and/or a space stamp to the manager.
  • the manager associates a code to this time stamp and/or this space stamp received from the telecommunication supplier.
  • codel E_kl (code, counter)
  • the codel and the manager Internet address are sent to the telecommunication supplier and then forwarded to the subscriber.
  • the subscriber connects to the said Internet address received from the telecommunication supplier and enters the codel, along with the content identifier if not integrated in codel.
  • code2 and an Internet delivery address are displayed on the internet page.
  • the subscriber accesses to the said Internet delivery address and he/her enters the code2 on this internet page.
  • the content provider deciphers code2 - using shared secret key k2 - and recovers the code and the counter. After verification of the said recovered data, the content provider authorizes the access to the requested data to the subscriber .
  • a suitable alternative replaces the manager internet page by an application - such as a Java® applet - present on internet page of the content provider accessed thanks to the Internet delivery address.
  • the subscriber sends a request for data transfer; the telecommunication supplier sends the content identifier and a time stamp and/or a space stamp to the manager.
  • the manager associates a code to this time stamp and/or this space stamp received from the telecommunication supplier.
  • the codel and the Internet delivery address are sent to the telecommunication supplier and then forwarded to the subscriber.
  • the subscriber connects to the said Internet delivery address received from the telecommunication supplier.
  • An application present on the said Internet delivery page invites the subscriber to enter the code received from the telecommunication supplier - namely the codel -, along with the content identifier if not integrated in codel.
  • the content provider deciphers code2 - using shared secret key k2 - and recovers the code, the counter and eventually the content identifier. After verification of the said recovered data, the content provider authorizes the access to the requested selection of data to the subscriber.
  • the subscriber could also send the identifier of a data selection (the title of a musical track for example) instead of the content provider's identifier.
  • the request destination is in our example, the short number, a URL that locates a Web resource.
  • said code does not determine specific data but is only used to protect subscriber's anonymity.
  • the manager transmits to the content provider the data selection identifier matching with the code corresponding to the request.
  • the transmission mode will depend on the interface type used between the applications.
  • the service Manager acts as a Trusted Third Party: his module dedicated to requests management (see Figure B) collects the subscriber's MSISDN number (and/or the temporary IP address), the request time stamp and the content provider's identifier from the telecommunication provider and store them in a temporary database. The latter data are temporarily stored in order to answer to the subscriber. He transfers the request time stamp and the content provider's identifier to the delivery management module. He receives from this module the Internet delivery address, according to the implementation methods described above, he sends this to the subscriber and destroys the information related to the subscriber.
  • the manager can operate in a distributed architecture spread between the different acting parties concerned, operator, service supplier, content providers (see Figure A), refer to the example with the radio station, or can be implemented in a centralised system (see Figure B) .
  • the manager comprises both the requests and the delivery management modules. It can also manage web delivery functionality by transferring the contents to be delivered from the content providers' side.

Abstract

The present invention relates to a method of transferring a selection of data stored in a database, managed by a content provider, by at least one mobile phone user, called subscriber wherein said database is connected to a management platform, called manager, said manager being connected to one or more application servers and to one or more telecommunication suppliers and wherein said transfer process comprises the following steps: Said subscriber enters into connection with one of said telecommunication suppliers by sending an identifier of said content provider, the sending action is named the request;. Said supplier transmits at least said identifier, together with at least a reception time stamp and/or a space stamp of said request to said manager; Said manager associates said identifier with an Internet delivery address of said content provider and associates said time stamp and/or space stamp with a code; Said manager transmits to said telecommunication supplier delivery information comprising either said Internet delivery address directly or indirectly linked to said code, or said Internet delivery address together with said code; or any relevant information directly or indirectly linked to said code to access Internet resources, said supplier being in charge to transmit said delivery information to said subscriber; To transfer said data selection, said subscriber goes to said address either by clicking on said delivery address directly or indirectly linked to said code, or by going to said delivery address with any Internet terminal and encoding said code preferably in an access form; At the reception of said code corresponding to the time stamp and/or to the space stamp, the content provider associates said code with a data selection and makes it available for said subscriber.

Description

METHOD OF TRANSFERRING DATA BEING STORED IN A DATABASE
Field of the Invention
The new invention is related to a method for transferring data being stored in a database by using a mobile phone, preferably said database being accessible via Internet and allows activating access to Internet resources .
State of the Art
Since the 90' s, many -processes have been described using mobile phone to deliver any kind of data, both on mobile phone and on Internet. All these processes are using the mobile phone number (MSISDN) of the mobile user as key identifier in the transferring process, either to send data directly to her/his mobile phone, or to identify an Internet resource.
. In particular, document WO 99/66746 describes the use of the MSISDN number to send a message to the mobile phone;
. Documents WO 99/67726; US 6 742 022; US 60/159083 use the MSISDN number of the data receiver to link it to a delivery URL;
. Patents EP-A-0851696; EP-A-1146701 ; US-A-5 987 508 link the MSISDN number to an E-mail user and document WO 01/10089; US- A-5 987 508 suggests the creation of an E-mail delivery address based on said MSISND.
The common purpose of these processes is to create a unique relationship between each subscriber and the delivery process, either by linking directly the MSISDN to the delivery address, or indirectly using an alias which stands for MSISDN. Some mobile service suppliers, i.e. the French suppliers, cannot directly collect the subscriber's mobile phone number, which is replaced by a unique valid alias which is periodically renewed. It is obvious that the alias is a substitute for the MSISDN to the extent that it identifies each subscriber individually for a determined period of time.
In conclusion, the solutions of the state of the art do not allow to guaranty the anonymity of the subscriber as a unique link is made between the subscriber MSISDN and the delivery process . Aim of the Invention
The aim of the present invention is to allow any subscriber to use his/her mobile phone in order to transfer data on Internet which do not have the drawbacks of the State of the Art. Preferably, the aim of the present invention is to allow any subscriber to use his/her mobile phone in order to transfer anonymously data on Internet.
Summary of the Invention
The present invention allows any subscriber to anonymously use his/her mobile phone in order to transfer data on the Internet, using either the moment when the request was performed or the place where the request was performed or either a combination of the said time and the said place.
The present invention discloses a method of transferring a selection of data stored in a database, managed by a content provider, by at least one mobile phone user, called subscriber wherein said database is connected to a management platform, called manager, said manager being connected to one or more application servers and to one or more telecommunication suppliers and wherein said transfer process comprises the following steps:
Said subscriber enters into connection with one of said telecommunication suppliers by sending an identifier of said content provider, the sending action is named the request;
. Said supplier transmits at least said identifier, together with at least a reception time stamp and/or a space stamp of said request to said manager;
Said manager associates said identifier with an Internet delivery address of said content provider and associates said time stamp and/or space stamp with a code;
Said manager transmits to said telecommunication supplier delivery information comprising either said Internet delivery address directly or indirectly linked to said code, or said Internet delivery address together with said code, or any relevant information directly or indirectly linked to said code to access Internet resources, said supplier being in charge to transmit said delivery information to said subscriber;
To transfer said data selection, said subscriber goes to said address either by clicking on said delivery address directly or indirectly linked to said code, or by going to said delivery address with any Internet terminal and encoding said code preferably in an access form;
At the reception of said code corresponding to the time stamp and/or to the space stamp, the content provider associates said code with a data selection and makes it available for said subscriber;
Preferably, the time stamp is the instant where the request was performed characterized by at least the date, the hour, the minute and the second of the request .
Preferably, the space stamp is the location where the request was performed characterized by for example the GPS coordinates of the subscriber.
Preferably, at least two subscribers are transferring a selection of data stored in a data base managed by a content provider .
Preferably, at least two subscribers, having sent said identifier of said Content provider, receive an identical code .
Preferably, at least two subscribers having sent said identifier of said content provider at the same time and/or from the same place received an identical code
Preferably, a counter is assigned to every said code.
Preferably, said counter is incremented by the manager each time it receives a time stamp and/or space stamp reception from the telecommunication supplier corresponding to the said code .
Alternatively, an adjustement parameter assigned to each counter is used to define a probability density function, the said density function being used to fix when the counter will be incremented.
Preferably, said identifier of said content provider is sent by said subscriber to said telecommunication supplier, either by sending an SMS message, or by calling, or by clicking on a link during an Internet session, or by sending an E-mail to the content provider's mailbox or by any other telecommunication means .
Preferably, said subscriber directly sends a data selection identifier to a destination dedicated to said Content provider, in this case either said code is sufficient to identify said selection, or said manager transmits said code and said data selection identifier to said content provider in order to allow to transfer said selection of data.
Preferably, said delivery address and said code are sent by said supplier, either by sending an SMS message, or by calling, or by sending information, or by redirecting to another application during an Internet session or by any other communication and/or telecommunication means .
Preferably, said selection can correspond to a given amount of codes .
Preferably, said telecommunication supplier transmits the subscriber's identifier, on top of said identifier and said time stamp and/or the space stamp, subscriber's identifier being preferably stored in a temporary database in order to be able to send said Internet delivery address and said code to said subscriber, said subscriber's identifier being preferably deleted immediately after sending this information.
Preferably, said manager associates with said code an encrypted or alias code.
Preferably, said encrypted or alias code is received by said content provider, said content provider receives or collects the key needed to decrypted said encrypted or alias code, before associating said code to said data selection.
Preferably, the encryption steps are performed by the manager that uses at least two keys.
Detailed Description of preferred embodiments of the present Invention
The present invention allows any subscriber to preferably anonymously use his/her mobile phone in order to transfer data on the Internet, using either the moment when the request was performed or the place where the request was performed or a combination of the said time and the said place or any combination of any physical data that can be acquired by his/her mobile phone.
According to a preferred embodiment, the present invention discloses a method of collecting a selection of data stored in a database, managed by a content provider, by mobile phone user, called subscriber wherein said database is connected to a management platform, called manager, said manager being connected to one or more application servers and to one or more telecommunication suppliers and wherein said collect process includes the following steps:
Said subscriber enters into connection with one of said telecommunication suppliers by sending an identifier of said content provider, the sending action is named the request;
. Said supplier transmits at least said identifier, together with reception time stamp (date, hour, minute, second) of said request to said manager;
. Said manager associates said identifier with the Internet delivery address of said content provider and associates said time stamp with a code corresponding to the moment when the request was performed;
Said manager transmits to said telecommunication supplier said Internet delivery address, either directly parameterised with said code, or together with said code, or according to any other method meant to access Internet resources, said supplier being in charge to retransmit this to said subscriber;
. To collect said data selection, said subscriber goes to said address either by clicking on said address parameterised with said code, either by going to said address with any Internet terminal and encoding said code in the access form;
At the reception of said code, the content provider associates said code with a data selection and makes it available for said subscriber;
Preferably, the said identifier of said content provider is sent by said subscriber to said telecommunication supplier, either by sending an SMS message, or by calling, or by clicking on a link during an Internet session, or by sending an E-mail to the content provider's mailbox or by any other telecommunication means .
Preferably, the said subscriber directly sends a data selection identifier to a destination dedicated to said Content provider, in this case either said code is sufficient to identify said selection, or said manager transmits said code and said data selection identifier to said content provider in order to allow to collect said selection anonymously.
Preferably, the said delivery address and said code are sent by said supplier, either by sending an SMS message, or by calling, or by sending information, or by redirecting to another application during an Internet session or by any other communication and/or telecommunication means. Preferably, several subscribers, having sent said identifier of said Content provider, receive an identical code.
Preferably, the said selection can correspond to a given amount of codes .
Preferably, said telecommunication supplier transmits the subscriber's identifier, on top of said identifier and said time stamp. The subscriber's identifier will be stored in a temporary database in order to be able to send said Internet delivery address and said code to said subscriber. Immediately after sending this information, said subscriber' s identifier will be deleted.
Preferably, said manager associates with said code an encrypted or alias code. As soon as said encrypted or alias code is received by said content provider, said content provider receives or collects the key needed to decrypted said encrypted or alias code, before associating said code to said data- selection.
Preferably, several subscribers, having sent said identifier to said Content provider at the same time, receive an identical encrypted or alias code.
The present invention preferably exists in the form of a method, which is available on the Internet. The service is managed by a management platform (hardware/software, named hereinafter manager) that puts in contact content owners or their distributors and all the mobiles subscribers.
It is meant by mobile subscriber any mobile phone user, independently from the terminal type he/she is using, hereinafter referred to as subscribers.
The content owner owns a database that he can market directly or through a distribution network. The distributor's role consists in distributing contents and getting supplied by one or more content owners (both are referred to as so-called content provider (s) ). Content or data have to be intended as any digital file type: program, text, tone, fix or animated picture ...
The invention is noticeable from other distribution systems using data collection as it allows advantageously the subscriber to protect his/her anonymity when delivering the requested content.
Only the content provider supplies a method for providing at least two related elements: one identifier, i.e. his name, a word, a phone number (long number, short number,...), a URL... and an Internet delivery address from which data can be retrieved (URL) .
As the subscriber remains preferably anonymous, this implies that there are no registration procedure nor personal data transfer in order to consult or download data. The intervention of the subscriber is limited to activate the transfer of information and to transfer data:
. The subscriber can use all the mobile communication means (call, SMS message, Internet session...) in order to identify the content provider: sending a key word in an SMS message, calling to a specific number, clicking on a link or a button...
. The request of the subscriber activates the identification process of a data selection and an Internet delivery address;
. Using any Internet terminal, the subscriber can connect to the Web and, depending on the Internet method used to access the data, (i.e. GET or POST methods, or any other Internet access method) , either he clicks on the URL parameterised with the data identifier, or he goes to the supplied Internet address and fills in said identifier in the access form in order to consult and/or download the requested data.
Internet terminal shall be understood as any device that enables to establish and to maintain an Internet session.
How is the subscriber' s anonymity protected?
The main characteristic of the invention consists in separating the request management (telecommunications aspects) and the data delivery process, using an identifier that has no unique or direct link with the subscriber (MSISDN, IP-address, E-mail, ...) . During the delivery process, the method is using either :
. the moment when the request was performed is used as unique subscriber' s identifier; or the place where the request was performed is used as unique subscriber' s identifier;
. or a combination of these two parameters - the request time and the request place - is used as unique subscriber's identifier .
. or any combination of any physical data that can be acquired by subscriber's mobile phone. The identifier corresponding to the request time and/or to the request place and/or to the request physical data can also be associated to the selection of data.
The different steps in the isolated delivery process management are the following:
The manager needs at least two information from the telecommunication supplier (mobile operator and/or wireless access service provider) in order to operate the delivery process: the content provider's identifier and the time stamp (date, hour, minute and second...) corresponding to the request reception time and/or the space stamp corresponding to the request place and/or any combination of any stamps corresponding to any physical data that can be acquired by subscriber's mobile phone.
The manager associates the content provider's identifier with the delivery URL and associates the time stamp and/or the space stamp and/or any combination of any physical data that can be acquired by subscriber's mobile phone with a code corresponding respectively to the moment when the request is performed and/or to the place where the request is performed and/or to any combination of any physical data that can be acquired by subscriber's mobile phone;
Depending on the software implementation dedicated to the URL management, the manager transmits to the telecommunication service supplier either the URL, directly or indirectly linked to said code, or the Internet delivery address and said code or any relevant information directly or indirectly linked to said code to access Internet resources. Subsequently said supplier has to transmit both to the subscriber.
Depending on the implementation method dedicated to URL management, the subscriber consult and/or downloads data either by clicking directly on the URL, or by going to the delivery site and encoding said code into the access form.
. When receiving the code corresponding to the moment when the request is performed and/or to the place where the request is performed and/or to any physical data acquired when the request was performed, the content provider links or associates said code to a selection of data and makes this available for the subscriber.
The subscriber's anonymity remains effectively protected, as when he/she is consulting and/or downloading data from the content provider's side, he is identified only through a code corresponding to request time and/or to the request place and/or to any physical data acquired when the request was performed. This code is not unique, to the extent that several, in particular all, the subscribers who request the data selection at the same time and/or at the same place can receive the same code. The identifier which is originating the request, either MSISND, or IP address, or E-mail... is totally ignored when data are delivered. It means by totally ignored that no unambiguous or univalent link can be establish between a subscriber and its request, without using illegal practises such as coalition between the telecommunication supplier and the manager.
The code comprises characters that can be either uppercase or lowercase alphabetic characters (A-Z, a-z), numbers (0-9) or special characters. A little more than 6 bits are needed to encode each character. A code of n characters of the above- mentioned 83 possible symbols corresponds to a binary value composed by n*log2(83) bits.
This method can be implemented in various ways, as demonstrated in the following examples:
Example 1 :
Let's imagine a subscriber listening to his favourite radio.
. The radio presenter of a program invites his audience to download for free some tracks from the playlist, offered by an advertiser. One just needs to send the name of the radio
(content provider's identifier) by SMS message.
The telecommunication supplier collects the subscriber's MSISDN, the name of the radio and the SMS time stamp (i.e. December 10, 14 hour 21 minutes and 43 seconds) . He only transmits the name of the radio and the time stamp to the Manager .
From this information, the manager associates the content provider' s identifier with the Internet delivery address (www.nameoftheradio.com) and determines the code corresponding to the moment when the request was performed, i.e. 12.10.14.21.43
Code and URL are transmitted to the telecommunication supplier, who sends them back to the subscriber, referring to the MSISDN number, i.e. in an SMS message.
. Connecting with any Internet terminal, the subscriber goes to the site www.nameoftheradio.com and fills in the code in an access form.
. The application server of the radio website associates the code corresponding to the moment when the request was performed to the music that was played on the radio at the same time, or to the playlist of the programme broadcast when the SMS message was sent, or to the daily playlist...
The subscriber consults the playlist and downloads the selected track; meanwhile he is displaying the commercial from the advertiser.
Depending on the mobile telecommunication means selected by the content provider in order to send his identifier, data transmission and delivery can occur in different forms. If we go back to our example, we can encounter the following situations :
. The subscriber calls to the Interactive Voice Response (IVR) of the radio station and receives a standard SMS message mentioning the Internet delivery address in the selected implementation format;
. The subscriber calls to the radio station' s IVR or sends an SMS message with the name of the radio and receives a WAP push SMS comprising the URL parameterised with the code corresponding to request time and from which he will be able to consult the playlist and/or download the selected track;
. The subscriber listens to the radio on line via his mobile phone, clicks on the browser download .button that is especially developed, a window opens and the window URL parameters are based on the code corresponding to the clicking time stamp. The subscriber can either consult all the playlist or part of it and downloads the selected track, or a commercial is displayed meanwhile the musical track is downloaded on his terminal. In any case, the click on the button stands for identifying the content provider and the temporary IP address is used only to send the URL parameterised with the code corresponding to request time. The subscriber remains anonymous for the content provider.
In all the variations presented above, all the subscribers who are sending or selecting data at the same time receive the same code and all of them access the same URL associated with the same code. The radio station can count the amount of sent URL associated with the same code and can decide to limit the download amount to this threshold in order to avoid misuse.
Example 2 :
Let's further suppose an advertiser would use advertising panels in order to invite consumers to send a request by means of their mobile phones (as described in one of the afore- mentioned methods) for downloading from its Web site a hitherto unpresented, successful TV-series. Any subscriber who would pass by the same advertisement would receive the same identifying code, respective to the place of request, or any subscriber who would pass by the same advertisement at the same time would receive an identical code.
A list of examples for this application could be endlessly continued.
Encryption:
The code can be produced from the time stamp and/or the space stamp by means of cryptographic methods such as pseudo-random bit generator (PRBG) , hash functions or security key encryption algorithms.
Preferably, a secret key encryption algorithm can be used to produce the codes. For example, the following way can be used: code=E ( k, time stamp and/or space stamp) where E() is the encryption function (AES for example) and k is the secret encryption key.
Alternatively, PRGB can be used to generate binary sequences of arbitrary length. When the content provider receives a time stamp and/or a space stamp, it generates a random binary value. The content provider has to store the correspondence between the time stamp and/or the space stamp and the produced random binary value.
Alternatively, a cryptographic hash function based on a secret key (also known as "message authentication code" or MAC) can be used to produce on the basis of an input value an output value that looks like a random value. In this case, we would have code=h (k, time stamp and/or space stamp) where h() is the hash function and k the secret key needed to compute the result .
When using a code produced by the means of a keyed hash function or of an encryption function, the secret key used to compute the function has to be transmitted to the content provider .
Preferably, the same key can be used to encrypt all the code produced for the same content provider during a certain period of time. The key is initially shared between the manager and the content provider.
Preferably, when using an encryption function, the only required communication between the manager and the content provider is sending the encryption key. Alternatively, when using a keyed hash function, the service provider has to receive from the manager the encryption key and the time stamps and/or the space stamps of the received request, in order for the service provider to be able to compare the code provided by the subscriber with hashes of the received time stamps and/or space stamp.
Moreover, in order to avoid misuse, again, the code sent to the subscriber can be encrypted or linked or associated to an alias code in such a way that the time stamp and/or the space stamp and/or any acquired physical data cannot be deduced from the code. Afterwards the decrypted code can be associated with a selection of the database.
Example 3 :
Alternatively, it is possible to modify the code derived from the time stamp in order to have a single use code. Such an implementation of the present invention associates a counter to the code. The access to the requested selection of data is only allowed one time per counter increment.
The different steps of this implementation are the followings:
The subscriber sends a request for data transfer.
The telecommunication supplier sends the content identifier and a time stamp and/or a space stamp to the manager.
The manager associates a code to this time stamp and/or this space stamp received from the telecommunication supplier.
If it is the first time that the manager uses this code, the manager set the counter to 1. If the code was already used, the manager increments by 1 the counter associated to this code. If the counter reaches its maximum value, no new code is produced anymore.
The manager computes the concatenation of the code and the counter. Afterwards, the manager calculates the codel=E_kl (code, counter ), kl being a secret key shared between the manager and the content provider. Preferably, a secret key is dedicated to each set of data.
The manager sends the encrypted code (codel), the corresponding time stamp and/or space stamp, and the Internet delivery address to the telecommunication supplier. The telecommunication supplier selects one MSISDN from the set of MSISDN that are associated with the corresponding time stamp and/or space stamp. The telecommunication supplier tags the selected MSISDN as already used and send a message comprising the codel and the Internet delivery address to the subscriber to which the chosen MSISDN corresponds .
The subscriber goes to the Internet delivery address and enters the codel.
The content provider decrypts the codel thanks to the secret key kl shared with the manager and retrieves the time stamp and the counter.
If the value of the counter was not already used for this code, the access is granted, otherwise the access is denied.
The here above described implementation allows to control easily the amount of connections to the selectable data. Moreover, this implementation prevents illicit connections to the service with stolen codes.
Alternatively, the increment of the counter can be tuned using an adjustment parameter. Each counter can have its own adjustment parameter. The said parameter defines a probability density function that is used to fix when the counter will be incremented.
Example 4 :
In case of coalition between the telecommunication supplier and the content provider a list of mobile phone numbers (MSISDN) associated to a given code can be retrieve. An implementation of the present invention based on a two encryption keys system can avoid retrieving of such a list.
The different steps of this implementation are the followings :
The subscriber sends a request for data transfer; the telecommunication supplier sends the content identifier and a time stamp and/or a space stamp to the manager.
The manager associates a code to this time stamp and/or this space stamp received from the telecommunication supplier.
The manager chooses a secret key - namely kl - only know by it and calculates the codel (codel=E_kl (code, counter) ) and increments the counter. The codel and the manager Internet address are sent to the telecommunication supplier and then forwarded to the subscriber.
The subscriber connects to the said Internet address received from the telecommunication supplier and enters the codel, along with the content identifier if not integrated in codel.
The manager deciphers codel - using key kl - and recovers thereby the code, the counter and eventually the content identifier. If the information recovered are valid a new encryption step generates code2 (code2=E_k2 (code, counter) ), k2 being a secret key shared between the manager and the content provider. The code2 and an Internet delivery address are displayed on the internet page.
The subscriber accesses to the said Internet delivery address and he/her enters the code2 on this internet page.
The content provider deciphers code2 - using shared secret key k2 - and recovers the code and the counter. After verification of the said recovered data, the content provider authorizes the access to the requested data to the subscriber .
In case of coalition between the telecommunication supplier and the content provider no information about the subscriber can be derived. Indeed, Codel is accessible to the telecommunication supplier while code2 is not. The content provider on the contrary has access to code2 exclusively. Therefore, no link can be made between code2 and codel, and per se between code2 and the subscriber MSISDN.
The hereabove-mentioned implementation required the access to two different internet pages. Therefore, it can be seen as complicated and time consuming to the subscriber. A suitable alternative replaces the manager internet page by an application - such as a Java® applet - present on internet page of the content provider accessed thanks to the Internet delivery address.
The different steps of this alternative implementation are the followings :
The subscriber sends a request for data transfer; the telecommunication supplier sends the content identifier and a time stamp and/or a space stamp to the manager.
The manager associates a code to this time stamp and/or this space stamp received from the telecommunication supplier. The manager chooses a secret key - namely kl - only know by it and calculates the codel (codel=E_kl (code, counter) ) and increments the counter. The codel and the Internet delivery address are sent to the telecommunication supplier and then forwarded to the subscriber.
The subscriber connects to the said Internet delivery address received from the telecommunication supplier. An application present on the said Internet delivery page invites the subscriber to enter the code received from the telecommunication supplier - namely the codel -, along with the content identifier if not integrated in codel.
The manager deciphers codel - using a secret key kl - and recovers thereby the code, the counter and eventually the content identifier. If the information recovered are valid a new encryption step generates code2 (code2=E_k2 (code, counter) ), k2 being a secret key shared between the manager and the content provider. Afterwards, the code2 is sent by the manager to the content provider using request such as a POST request comprising the code2.
The content provider deciphers code2 - using shared secret key k2 - and recovers the code, the counter and eventually the content identifier. After verification of the said recovered data, the content provider authorizes the access to the requested selection of data to the subscriber.
The subscriber could also send the identifier of a data selection (the title of a musical track for example) instead of the content provider's identifier. The request destination is in our example, the short number, a URL that locates a Web resource. The next steps of the process differ according to the use:
. Either the management process remains unchanged as the code corresponding to request time also identifies the data selection.
. Or said code does not determine specific data but is only used to protect subscriber's anonymity. In this case, when the subscriber accesses the Internet delivery address, the manager transmits to the content provider the data selection identifier matching with the code corresponding to the request. The transmission mode will depend on the interface type used between the applications.
Today, the transactions between operators, access providers and service suppliers are based on a single identifier: the subscriber's MSISDN number. In these circumstances and until operational procedures are modified, the service Manager acts as a Trusted Third Party: his module dedicated to requests management (see Figure B) collects the subscriber's MSISDN number (and/or the temporary IP address), the request time stamp and the content provider's identifier from the telecommunication provider and store them in a temporary database. The latter data are temporarily stored in order to answer to the subscriber. He transfers the request time stamp and the content provider's identifier to the delivery management module. He receives from this module the Internet delivery address, according to the implementation methods described above, he sends this to the subscriber and destroys the information related to the subscriber.
According to the operating methods, the manager can operate in a distributed architecture spread between the different acting parties concerned, operator, service supplier, content providers (see Figure A), refer to the example with the radio station, or can be implemented in a centralised system (see Figure B) . In this case, the manager comprises both the requests and the delivery management modules. It can also manage web delivery functionality by transferring the contents to be delivered from the content providers' side.

Claims

Claims
1. Method of transferring a selection of data stored in a database, managed by a content provider, by at least one mobile phone user, called subscriber wherein said database is connected to a management platform, called manager, said manager being connected to one or more application servers and to one or more telecommunication suppliers and wherein said transfer process comprises the following steps:
Said subscriber enters into connection with one of said telecommunication suppliers by sending an identifier of said content provider, the sending action is named the request;
. Said supplier transmits at least said identifier, together with at least a reception time stamp and/or a space stamp of said request to said manager;
Said manager associates said identifier with an Internet delivery address of said content provider and associates said time stamp and/or space stamp with a code;
Said manager transmits to said telecommunication supplier delivery information comprising either said Internet delivery address directly or indirectly linked to said code, or said Internet delivery address together with said code, or any relevant information directly or indirectly linked to said code to access Internet resources, said supplier being in charge to transmit said delivery information to said subscriber;
To transfer said data selection, said subscriber goes to said address either by clicking on said delivery address directly or indirectly linked to said code, or by going to said delivery address with any Internet terminal and encoding said code preferably in an access form;
At the reception of said code corresponding to the time stamp and/or to the space stamp, the content provider associates said code with a data selection and makes it available for said subscriber;
2. Method according to claim 1, wherein at least two subscribers are transferring a selection of data stored in a data base managed by a content provider.
3. Method according to claim 2, wherein at least two subscribers, having sent said identifier of said Content provider, receive an identical code.
4. Method according to any of the previous claims, wherein a counter is assigned to every said code.
5. Method according to claim 4, wherein said counter is incremented by the manager each time it receives a time stamp and/or space stamp reception from the telecommunication supplier corresponding to the said code.
6. Method according to claim 4, wherein an adjustement parameter assigned to each counter is used to define a probability density function, the said density function being used to fix when the counter will be incremented.
7. Method according to any of the previous claims, in which said identifier of said content provider is sent by said subscriber to said telecommunication supplier, either by sending an SMS message, or by calling, or by clicking on a link during an Internet session, or by sending an E-mail to the content provider' s mailbox or by any other telecommunication means .
8. Method according to any of the previous claims, in which said subscriber directly sends a data selection identifier to a destination dedicated to said Content provider, in this case either said code is sufficient to identify said selection, or said manager transmits said code and said data selection identifier to said content provider in order to allow to transfer said selection of data.
9. Method according to any of the previous claims, in which said delivery address and said code are sent by said supplier, either by sending an SMS message, or by calling, or by sending information, or by redirecting to another application during an Internet session or by any other communication and/or telecommunication means.
10. Method according to any of the previous claims, in which said selection can correspond to a given amount of codes.
11. Method according to any of the previous claims, in which said telecommunication supplier transmits the subscriber' s identifier, on top of said identifier and said time stamp and/or the space stamp, subscriber's identifier being preferably stored in a temporary database in order to be able to send said Internet delivery address and said code to said subscriber, said subscriber's identifier being preferably deleted immediately after sending this information.
12. Method according to any of the previous claims, in which said manager associates with said code an encrypted or alias code .
13. Method according to claim 11, wherein as soon as said encrypted or alias code is received by said content provider, said content provider receives or collects the key needed to decrypted said encrypted or alias code, before associating said code to said data selection.
14. Method according to claims 11 to 12, wherein the encryption steps are performed by the manager that uses at least two keys.
PCT/BE2008/000015 2007-02-28 2008-02-28 Method of transferring data being stored in a database WO2008104039A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP08714495A EP2137945A2 (en) 2007-02-28 2008-02-28 Method of transferring data being stored in a database
US12/549,257 US20100088401A1 (en) 2007-02-28 2009-08-27 Method of transferring data being stored in a database

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US89221507P 2007-02-28 2007-02-28
US60/892,215 2007-02-28

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/549,257 Continuation US20100088401A1 (en) 2007-02-28 2009-08-27 Method of transferring data being stored in a database

Publications (3)

Publication Number Publication Date
WO2008104039A2 true WO2008104039A2 (en) 2008-09-04
WO2008104039A3 WO2008104039A3 (en) 2009-04-23
WO2008104039A8 WO2008104039A8 (en) 2009-06-18

Family

ID=39721637

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/BE2008/000015 WO2008104039A2 (en) 2007-02-28 2008-02-28 Method of transferring data being stored in a database

Country Status (4)

Country Link
US (1) US20100088401A1 (en)
EP (1) EP2137945A2 (en)
RU (1) RU2457631C2 (en)
WO (1) WO2008104039A2 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4529995B2 (en) * 2007-04-18 2010-08-25 株式会社日立製作所 Process management device and process management system
US8712474B2 (en) * 2007-04-20 2014-04-29 Telefonaktiebolaget L M Ericsson (Publ) Secure soft SIM credential transfer
KR20110020619A (en) * 2009-08-24 2011-03-03 삼성전자주식회사 Method for play synchronization and device using the same
US8863256B1 (en) 2011-01-14 2014-10-14 Cisco Technology, Inc. System and method for enabling secure transactions using flexible identity management in a vehicular environment
US10021213B2 (en) * 2015-02-09 2018-07-10 Google Llc Systems and methods for adaptive cloning of mobile devices

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998003923A1 (en) * 1996-07-21 1998-01-29 Ernestine, Llc World wide web bar code access system
WO2001075674A2 (en) * 2000-03-31 2001-10-11 Digital:Convergence Corporation Method and apparatus for delivering information from a remote site on a network based on statistical information
WO2006030521A1 (en) * 2004-09-17 2006-03-23 Fujitsu Limited Information providing system

Family Cites Families (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5812776A (en) * 1995-06-07 1998-09-22 Open Market, Inc. Method of providing internet pages by mapping telephone number provided by client to URL and returning the same in a redirect command by server
US5946629A (en) * 1995-11-28 1999-08-31 Telefonaktiebolaget L M Ericsson Cellular telephone network having short message service interaction with other networks
US6742022B1 (en) * 1995-12-11 2004-05-25 Openwave Systems Inc. Centralized service management system for two-way interactive communication devices in data networks
US6192407B1 (en) * 1996-10-24 2001-02-20 Tumbleweed Communications Corp. Private, trackable URLs for directed document delivery
US6493430B2 (en) * 1996-12-24 2002-12-10 At&T Wireless Services, Inc. Method of wireless retrieval of information
US5978806A (en) * 1997-02-18 1999-11-02 Ameritech Corporation Method and apparatus for communicating information about a called party to a calling party
US5987508A (en) * 1997-08-13 1999-11-16 At&T Corp Method of providing seamless cross-service connectivity in telecommunications network
FR2771875B1 (en) * 1997-11-04 2000-04-14 Gilles Jean Antoine Kremer METHOD FOR TRANSMITTING INFORMATION AND COMPUTER SERVER IMPLEMENTING IT
US6065120A (en) * 1997-12-09 2000-05-16 Phone.Com, Inc. Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices
US6240445B1 (en) * 1998-04-24 2001-05-29 Openware Systems Inc. Computer implemented method and apparatus for receiving facsimile messages using an indentifier appended to a shared telephone number
SE521263C2 (en) * 1998-06-22 2003-10-14 Ericsson Telefon Ab L M Device and method for establishing connection between a first and second subscriber by means of a public register
US6256666B1 (en) * 1998-07-14 2001-07-03 International Business Machines Corp. Method and system for remotely managing electronic mail attachments
IL128935A (en) * 1998-09-18 2003-10-31 Direct & Clear Inc Communication method and system utilizing a specific communication code
US6332127B1 (en) * 1999-01-28 2001-12-18 International Business Machines Corporation Systems, methods and computer program products for providing time and location specific advertising via the internet
US6141413A (en) * 1999-03-15 2000-10-31 American Tel-A-System, Inc. Telephone number/Web page look-up apparatus and method
US6246871B1 (en) * 1999-09-24 2001-06-12 Nokia Networks Oy Method and apparatus for providing access of messages to multiple recipients in cellular networks
US6788769B1 (en) * 1999-10-13 2004-09-07 Emediacy, Inc. Internet directory system and method using telephone number based addressing
US6671714B1 (en) * 1999-11-23 2003-12-30 Frank Michael Weyer Method, apparatus and business system for online communications with online and offline recipients
US6516203B1 (en) * 1999-12-22 2003-02-04 Bellsouth Intellectual Property Corporation Method and system for providing additional information to a subscriber based on a universal resource locator
WO2001061610A2 (en) * 2000-02-18 2001-08-23 Walker Digital, Llc Method and apparatus for conducting or facilitating a promotion
DK1146701T3 (en) * 2000-03-24 2006-03-27 Allisblue Sa Procedure for transferring data stored in a database
GB0007940D0 (en) * 2000-04-01 2000-05-17 Hewlett Packard Co Gathering information from short-range portals
US20010049661A1 (en) * 2000-04-17 2001-12-06 John Casey Power Method for interactive advertising on the internet
US20050033639A1 (en) * 2000-05-19 2005-02-10 Noclips.Com Inc. Multi-vendor transactions based on near-immediate rebate detection
US8060389B2 (en) * 2000-06-07 2011-11-15 Apple Inc. System and method for anonymous location based services
US6891953B1 (en) * 2000-06-27 2005-05-10 Microsoft Corporation Method and system for binding enhanced software features to a persona
FR2811843B1 (en) * 2000-07-13 2002-12-06 France Telecom ACTIVATION OF AN INTERACTIVE MULTIMEDIA TERMINAL
JP4281238B2 (en) * 2000-10-06 2009-06-17 ソニー株式会社 Program information providing apparatus and method, image recording system, and program storage medium
WO2002056139A2 (en) * 2000-10-26 2002-07-18 Digimarc Corporation Method and system for internet access
WO2002042866A2 (en) * 2000-11-22 2002-05-30 Advertising.Com A system and method for providing incentives to customers over a computer network
US6603840B2 (en) * 2000-12-06 2003-08-05 At&T Corp. Technique for linking telephony and multimedia information
US20020091566A1 (en) * 2001-01-10 2002-07-11 Catalina Marketing International, Inc. Method and system for utilizing a telephone as a consumer request device for issuing promotions
US20030004802A1 (en) * 2001-03-19 2003-01-02 Jeff Callegari Methods for providing a virtual coupon
US20020143968A1 (en) * 2001-03-29 2002-10-03 International Business Machines Corporation Insuring the proper return of queries requested by world wide web client stations from web sources when dynamic IP addresses are assigned to client stations
WO2003025822A1 (en) * 2001-09-19 2003-03-27 Matsushita Electric Corporation Of America Adaptive electronic coupon
US7493269B2 (en) * 2001-10-30 2009-02-17 Comverse Ltd. Method and system for enabling the dispensing and redeeming of vouchers by voicemail
US7187376B2 (en) * 2002-06-04 2007-03-06 Sap Aktiengesellschaft Displaying views on computer screens
US20030233276A1 (en) * 2002-06-18 2003-12-18 Mark Pearlman System and method of using portable electronic devices for electronic coupon and voucher redemption
US20030233482A1 (en) * 2002-06-18 2003-12-18 Skrepetos Nicholas C. System and method for enhancing a user's web browsing experience
JP2004088726A (en) * 2002-06-26 2004-03-18 Casio Comput Co Ltd Network printing system
US6968181B2 (en) * 2002-10-17 2005-11-22 Buffalo Inc. Technique of providing information to mobile devices
US20040088349A1 (en) * 2002-10-30 2004-05-06 Andre Beck Method and apparatus for providing anonymity to end-users in web transactions
SE0301967D0 (en) * 2003-03-27 2003-07-03 Ericsson Telefon Ab L M A method and apparatus for supporting content purchases over a public communication network
US20050071229A1 (en) * 2003-09-30 2005-03-31 Alex Mashinsky System and method for permitting the secure creation, distribution, tracking, and redemption of payments to a customer
JP4732974B2 (en) * 2006-07-27 2011-07-27 株式会社日立製作所 Packet transfer control method and packet transfer apparatus
SI2082605T1 (en) * 2006-10-05 2018-02-28 Eureka S.A. Systems and methods for automated wireless authorization for entry into a geographic area

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998003923A1 (en) * 1996-07-21 1998-01-29 Ernestine, Llc World wide web bar code access system
WO2001075674A2 (en) * 2000-03-31 2001-10-11 Digital:Convergence Corporation Method and apparatus for delivering information from a remote site on a network based on statistical information
WO2006030521A1 (en) * 2004-09-17 2006-03-23 Fujitsu Limited Information providing system

Also Published As

Publication number Publication date
EP2137945A2 (en) 2009-12-30
RU2457631C2 (en) 2012-07-27
RU2009135296A (en) 2011-04-10
WO2008104039A8 (en) 2009-06-18
WO2008104039A3 (en) 2009-04-23
US20100088401A1 (en) 2010-04-08

Similar Documents

Publication Publication Date Title
US6463533B1 (en) System for generating site-specific user aliases in a computer network
CN108496382B (en) Secure information transmission system and method for personal identity authentication
CN1839608B (en) Device and method for generating a unique user's identity for use between different domains
EP1976181B1 (en) A method, apparatus and data download system for controlling the validity of the download transaction
EP1452027B1 (en) Access to encrypted broadcast content
US6651166B1 (en) Sender driven certification enrollment system
CN1739076A (en) Method for transmitting encrypted user data objects
US20060168578A1 (en) Methods and systems for managing a mobile client in a client-server system connected via a public network
US20140344908A1 (en) Data retrieval redirection
EP1048181B1 (en) Procedure and system for the processing of messages in a telecommunication system
CA2295150A1 (en) Data communications
US20100306539A1 (en) Method and system for content delivery control using a parallel network
MXPA04007546A (en) Method and system for providing third party authentification of authorization.
WO2007076685A1 (en) A method for extending the url applicable to the streaming media system
WO2007144388A1 (en) A method for restricting access to digital content
CN1235448A (en) Centralized certificate management system for two-way interactive communication devices in data networks
US8156340B1 (en) System and method for securing system content by automated device authentication
CN110995418A (en) Cloud storage authentication method and system, edge computing server and user router
WO2008104039A2 (en) Method of transferring data being stored in a database
KR101241864B1 (en) System for User-Centric Identity management and method thereof
US20040230649A1 (en) Method for the production of a first identifier isolating a user connecting to a telematics network
EP2605477A1 (en) Proxy server operation
JP3971352B2 (en) Personal information disclosure method and system, communication terminal
CN115694948A (en) Resource acquisition method and device
KR100606751B1 (en) service method for certificating respective right through network, and the system for the same

Legal Events

Date Code Title Description
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2008714495

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2008714495

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2009135296

Country of ref document: RU